About your Search

20130416
20130424
Search Results 0 to 19 of about 20
, the advancing america's networking and information technology research and development act of 2013. h.r. 967 is a good bipartisan bill which i was pleased to join mrs. lummis from wyoming and mr. hall from texas in introducing. h.r. 967 is largely based on a 2009 house-passed bill that was ntroduced by then-chairman gordon and ranking member hull. but this has some updates and reflects changing to the -- changes to the information and technology landscape as well as policy and management recommendations made by an outside panel of experts charged with evaluating nitr-d program. the program involves a collaboration of 15 federal resedge and development agencies, each contributing its own unique expertise and effort. to ensure that we make most effective use of our federal r&d resources and remain a leader in these fields. h.r. 967 requires that all 15 agencies come together to develop and periodically update a strategic plan for federal invest. s in -- investments in i.t. r&d. h.r. 967 will increase support, calls for increased support for large scale long-term interdisciplinary research in i
the impacts of extreme weather events, clean energy technologies and the threats of rising temperatures across the country. in contrast, we are not aware of any republican member who has spoken on the house floor about the dangers of climate change and the committee of jurisdiction is not even willing to hold a hearing to hear what the scientists and experts have to say about the issue. i have a message to house republicans, you can't make climate change go away by ignoring the problem. . . . the speaker pro tempore: for what purpose does the gentlewoman from washington rise? mrs. mcmorris rodgers: to address the house for one minute and to revise and extend my remarks. the speaker pro tempore: without objection. mrs. mcmorris rodgers: thank you, madam speaker. today, our hearts remain heavy -- our hearts are heavy for those who lost their lives on monday's unspeakable act of violence. for those who remain in critical condition, for the parents who lost their 8-year-old son, and for the families whose loved ones never came home from the boston marathon. while our sorrow is great, so, too, is o
. the pace of technology change and spread of advanced military technology to state and nonstate actors pose an encreasing challenge to america's military. this is the environment that is facing the department of defense as it enters a third year of flat or declining budgets. the onset of these constraints has led to belt tightening in military modernization, force structure, personnel costs and overhead expenditures. it has given us the opportunity to reshape the military and reform defense institutions to better reflect 21st century realities. the process began under the leadership of secretary gates. secretary gates curtailed more than 30 modernization programs and trimmed overhead costs within the military services and across the defense enterprise. the realignment continued secretary panetta who crafted new strategic guidance in an f.y. 2013 defense budget plan which reduced the department's top line by $487 billion over the course of a decade. the president's request of $526.6 billion for fy 2014 continues to implement the president's defense strategic guidance and enhances the departm
personnel along our borders as well as utilization of proven surveillance technology along the highest traffic areas across the southwest border. reducing wait times at the ports of entry the budget requests 35rks00 port officers. to scurel maritime borders the budget invests in coast guard assets, including the seven national security cutter and fast response cutters. the bum continues the department's focus on smart enforcement of our country's immigration laws. it supports the administration's effort to focus the enforcement system on safety threats and the integrity of the immigration system through childhood arrivals and greater use of rosecutor yull discretion. we support more cost effective initiatives of secure communities. e budget invests in monitory compliance to work sight related laws. while continuing to support alternatives to the tension, detention reform and immigrant immigration efforts. comprehensive immigration reform will help us build on these efforts and strengthen boarder security by enabling d.h.s. while focusing on criminals, human smallingers and those who im
. it was the proper mix of people, technology, and infrastructure changes. that also was a big change. all of the money had gone into border patrol in the past year the new effort was to try to get a much more effective combination of researchers spirit that continues today. i predict that when the new bill comes out, there will be all kinds of focus on drones and more modern technology, etc.. that combination has been a very important change, as well. they all have to do with efforts made on the u.s. side, principles used that involved mexico in varying degrees. the fourth one of those principles had to do with the engagement with stakeholders, in communities as well as the mexican government. and cooperation and increased cooperation coronation with mexico. oft idea led to all kinds community-based mechanisms, advisory committees, stakeholders with the border patrol. it also had to do with systematic operation, law enforcement agency to law enforcement agency, between the as. border patrol, as well others on the ground, and mexico. there have been ups and downs over the years. efforts at
strategy that combines personnel, the ground, and technology like drones to monitor the border. as far as interior enforcement, there will put in place a mandatory employment verification system, e-verify. and assistant to make sure e- verify is manageable and for employers and fraud-proof, to make sure people cannot make up social security numbers or work off stolen social security numbers. host: the gang of eight spoke yesterday on capitol hill. fourrepublicans and democrats. lindsey graham of south carolina addressed concerns that he has heard from his peers about the pathway to citizenship. [video clip] >> learn the language, as a civics exams, pay a fine, work, pass a criminal background check, half of my family would be excluded. this is no easy task. [laughter] i'm glad we are not applying it to ourselves. knowope is that america i is ready for immigration reform. you look at all the polls. if the congress ready to do something that we should have done a long time ago? i really believe we are. if you think the border can be better secured, we have an idea for you to consider. if
and can only respond to known threats. cyberthreats evolve at the speefed technology and this measure helps the private sector protect against cyberattacks by providing companies with the latest cyberthreat information from the intelligence community which has timely classified information about destructive malware. this cyberthreat intelligence is the information that companies and the government need to protect and defend their networks. the so-called signatures are primarily made up of numerical codes consisting of zeros and ones without any perm information attached. -- any personal information atammed. cispa is a result of cooperation between the community, companies and to a certain degree the white house as it pertains to many measures included in this legislation. during their efforts to improve the bill, they also maintain a dialogue with privacy advocates in an effort to strengthen civil liberties, protections and oversights. i had a personal note here for the reason that over a period of 10 years i served eight of those years on the intelligence committee. and the now chair
to have more flexibility in the times of services we provide. technology is going to transform the mail industry in a lot of new and exciting ways and we need to support that speed-up in the transformation. it's not hard to imagine that customers' expectations are going to change dramatically in the coming years. they already have been. customers' tastes are changing. imagine being able to use your smart phone to redirect your male and packages. having them clevered to a current location you're at right now. imagine being able to use a mobile a.m. that has the ability to display what you're going to get in your mailbox over the next few days. that's going to create opportunities for marketers. when you think about all the emails and messages you get today, the mail is the one blast last place where you can get a surprise and there's a lot of peapings you can build around that. imagine if you were to get a notification the moment that your packages and your mail were delivered to your door. imagine if the mail carrier technology enabled so was half a piece of male on a smart phone and n
and missiles and stealth technology and ability to fight supersonic speeds. it may well be the way it has been designed to evade budget cutters in washington. more, sunday at 8:00 and c- span's "q&a". came into the white house. she was a 47-year-old lady who hated politics. thewas deeply depressed at death of her last surviving son. especially under the terrible circumstances in which she died. friends,ot have many unfortunately she had a wonderful family who kept her going. there always seem to be somebody there. i do not think he read very much. she was a very intellectual woman, highly educated. with that intellect and wonderful education, it seemed wasted in some way. >> the conversation on jayne pearce, the life of the 14th president, is now available on our web site. tune in monday for our next program on the first lady, mary todd lincoln. >> this documentary comes from zachary cohen of the adele davis academy in sandy springs, georgia. his message to the president looks at funding for education. it is a second prize-winning video in this year's c-span studentcam competition. >> this is
and the military side. i've constantly tried to improve how we address the need for the next generation technology, public-private cooperation and ensuring that we have the price personnel to counter this 21st century cyberthreat. however, i am uncompromising in safeguarding the rights of our citizens and i will never sacrifice our civil liberties for unneeded intrusion. to this end, the amendment i am offering today would strengthen existing provisions in the bill to include the privacy officer and the officer for civil rights and civil liberties of the department of homeland security askey stakeholders in the report that would a-- as key stakeholders in the report. this report would assess how this legislation affected our civil liberties and privacy throughout our federal government, and the department of homeland security is the -- the key civil department in our federal government that develops and implements cybersecurity protocalls for the rest of the -- protocols for the rest of the federal government. it is crucial that they be part of any assessment and work with both the privacy office
, technology, and infrastructure changes. that also was a big change. all of the money had gone into border patrol in the past year the new effort was to try to get a much more effective combination of researchers spirit that continues today. i predict that when the new bill comes out, there will be all kinds of focus on drones and more modern technology, etc.. that combination has been a very important change, as well. tober three, they all have do with efforts made on the u.s. side, principles used that involved mexico in varying degrees. the fourth one of those principles had to do with the engagement with stakeholders, in commuties as ll as the mexican government. and cooperation and increased cooperation coronation with mexico. that idea led to all kinds of community-based mechanisms, advisory committees, stakeholders with the border patrol. it also had to do with systematic operation, law enforcement agency to law enforcement agency, between the u.s. border patrol, as well as others on the ground, and mexico. there have been ups and downs over the years. but those efforts at professio
-skilled immigration area. at microsoft and across the technology sector, we are increasingly grappling with a significant challenge. we are not able to fill all the jobs we are creating. the numbers help to share the story. at a te when unemployment hovers just below 8% unemployment rate in computer and mathematical operation has fallen to 3.2%, and in many states in many subcategories it has fallen below 2%. unfortunately the situation is likely to get worse, better -- rather than better. it is estimated that this year the economy will create over 120,000 jobs. in this will require a bachelor degree in computer science. all of the countries together will produce only 51,474 of these degrees. that is why high-skilled immigration and this legislation is of such great importance. the bill you are considering does three very important things. first, it addresses trd shortag. it eliminates or goes very far to reduce the backlog. it eliminates the per country cap and a crew to create a green card category for advanced cream degrees. all things that are needed. second, the bill quite rightly
of attribute may not be its radars and missiles and technology and ability to fight at super sized cities. it may be the way it has been designed to ease a budget cutters. more on sunday at 8:00 p.m. on c-span's "q & a." >> in their documentary, "what's the catch?," rebecca levy and shelby stevens talk about seafood. iny are second prize winn this year's c-span studentcam competition. >> throughout the past few decades, the amount of damage to our water has increased exponentially. come to the salt water and oceans. it has become even more prominent than ever before. the fish that were healthy are not going extinct. each year, the u.s. consumes close to 5 billion tons of seafood. it is the third rank country for consuming fish. thecase of gone by since overuse of our country's natural resources. how can we sustain heating as many fish as we do without sustaining natural fish populations. table aren the dinner not always when you -- what you think they are. where is this fish coming from? the answers to this question fall into the hands of many fish workers. there are antibiotics used in f
to our critical infrastructure. >> how do you work to prevent this? >> we have technology, cyber technologies, prevention technologies. we spend a lot of time now on technologies.
as technology and people become more savvy? what are we doingak c protect ourselves from things tt are chemical, biological, and radiological? >> gen 3 is undergoing an assessment as to whether it will ultimately be it for the money we are putting into it. rather than head into a large aqueous vision -- a large acquisition, there are enough problems with it that our acquisitions review board has asked for an individual assessment that is on a timeline. there is carryover money that can be deployed. it is really a matter of let's make sure that he forward to a large acquisition, we really know what we are doing and what we are getting. or have been problems with the gen 3.tages of jen -- one i would point to is a major whicht by the president is that national bio facility in kansas. we have been for a long time we knew -- need a new level for lab. they kansas legislature has agreed to put in roughly $300 million. we put in 700 million or so for the facility. -- if this is approved and appropriated, we can begin to structure and of a major lap and be done by 2020. i think long-term infrastructure
, the piece, the attribute may not bawl of the missiles and stealth technology and the ability to fight supersonic speed. it may be the way it is designed to avoid budget cutters in washington. on re on sunday at 8:00 c-span's "q&a." >> at a senate hearing to discuss the immigration bill this week. homeland security janet napolitano was scheduled to testify but was unable to do due to the ongoing investigation there. a member of the u.s. commission on civil rights as well as former c.b.o. director testified and discussed concerns and the benefits in the legislation. his is an hour and 40 minutes. >> the committee can come to order please. . apologize for the delay as you know there is a great .elay going on in massachusetts i hope everybody can well understand why the secretary napolitano will not be here. testimony. dule her -- hopefully senator feinstein won't mind me mentioning but she was saying and i agree on how proud we are on how law enforcement responded. i am distressed to hear of an officer killed and another critically wounded just as we e of all the people who were injured
of the issues we have looked at and there are ways technology-wise to do checks. this legislation does not move in that direction. it is the opposite, prohibiting a national registry so that information about themselves are not made public and not controlled by government. they are controlled by the person who sells the gun, so therefore there is no record of gun ownership and that is specifically admitted under current law and the bills we are taking up today. the suggestion you are making is one we have had in the past. i do not think there is the legislative support to move that type of proposal, but i agree with you that it is worthy to take a look at. look at both sides had right now there is a missed trust of what government will do with that information. those answers need to be -- questions need to be answered. host: from twitter, the fact that it will not stop all people from getting guns is a weak excuse. let me put another issue on the table. you serve on the foreign affairs committee and this is the headline in the international section of "the new york times." government will do wi
plan calls for more security strategy that combines personnel, the ground, and technology like drones to monitor the border. as far as interior enforcement, there will put in place a mandatory employment garrett overification system, e-verify. and assistant to make sure e- verify is manageable and for employers and fraud-proof, to mae people cannot make up social security numbers or work off stolen social security numbers. st: the gang of eight spoke yesterday on capitol hill. four republicans and four democrats. lindsey graham of south carolina addressed concerns that he has heard from his peers about the pathway to citizenship. [video clip] >> learn the language, as a civics exams, pay a fine, work, pass a criminal background check, half of my family would be excluded. this is no easy task. [laughter] i'm glad we are not applying it to ourselves. i knowe is that america is ready for immigration reform. you look at all the polls. if the congress ready to do something that we should have done a long time ago? i really believe we are. if you think the border can be better secured, we h
records are prime targets for attackers to steal. according to the information technology industry council, 18 adults become victims to cybercrime, including identity campaigns ishing every second. this adds up to 1 1/2 million cybercrime victims each day. cyberattacks present a very real and dangerous threat to the united states, however the government currently
of environmental degradation. wh fnetic pace of technolocal change and the spread of advanced military technology to state and non- state actors pose an increasing challenge to america's military. this is the strategic environment facing the department of defense as it enters a third year of flat or declining budgets. the onset of these resource constraints has already led to significant and ongoing belt- tightening in military modernization, force structure, personnel costs, and overhead expenditures. it has also given us an opportunity to reshape the military and reform defense institutions to better reflect 21st century realities. the process began under the leadership of secretary gates, who canceled or curtailed more than 30 modernization programs and trimmed overhead within the military services and across the defense enterprise. these efforts reduced the department's topline by $78 billion over a five year period, as detailed in the department's fy 2012 budget plan. the realignment continued under secretary panetta, who worked closely with the president and the joint chiefs of staff to cra
Search Results 0 to 19 of about 20

Terms of Use (10 Mar 2001)